Loading...

Table of Content

    15 October 2009, Volume 1 Issue 10
    算法分析与设计
    Application of Hybrid Strategy Based on Tabu Search and Ant Colony Algorithm to Quadratic Assignment Problem
    LU Cong-ying;ZHAO Gang-bin;WANG Bao-sheng
    2009, 1(10):  1-3.  doi:10.3969/j.issn.10062475.2009.10.001
    Asbtract ( 1764 )  
    Related Articles | Metrics
    Quadratic Assignment Problem(QAP) is a NPhard problem and it has numerous real life applications in, for example, school layout, circuit board designing and typewriter keyboard designing. Ant Colony Algorithm (ACA) behaves well in finding local optium, whereas its global search depends on selection of the evaporation coefficient. An unsuitable evaporation coefficient may result in local optium of final solutions. So this paper presents a new Hybrid Ant Colony Algorithm (HACA) to solve quadratic assignment problem. The results obtained show that the new approach is efficient.
    Port Cargo Throughput Forecast Based on BP Neural Network
    CHEN Ting-ting;CHEN Yi-yi
    2009, 1(10):  4-2.  doi:10.3969/j.issn.1006-2475.2009.10.002
    Asbtract ( 1119 )  
    Related Articles | Metrics
    Forecast of port throughput is very important for port construction and layout.This thesis introduces the theories of BP Neural Network into the field of cargo throughput forecast, and sets up a threelayer neural network model with the factor influencing the cargo throughput as the input artificial neuron, and the cargo throughput as the output artificial neuron. The model achieves promptly the accurate and satisfactory results in the Nanjing cargo throughput forecast.
    Research on Rangefree Localization Algorithm in Wireless Sensor Networks
    XU Xiu-lan
    2009, 1(10):  6-4.  doi:10.3969/j.issn.1006-2475.2009.10.003
    Asbtract ( 1724 )  
    Related Articles | Metrics
    Node localization is a fundamental and crucial issue for Wireless Sensor Network (WSN). In view of the limitations of rangebased techniques, rangefree localization scheme is proposed. Existing rangefree localization approaches are discussed and presented in detail, and the performance of them are compared. Finally, future works in the field of rangefree localization algorithm are pointed out.
    SAR Raw Data Compression Based on Lifting Wavelet Transform and Block Adaptive Quantization
    LI Xing;JIANG Zhi-nong
    2009, 1(10):  10-4.  doi:10.3969/j.issn.1006-2475.2009.10.006
    Asbtract ( 1071 )  
    Related Articles | Metrics
    SAR raw data compression by using lifting wavelet transform and block adaptive quantization is studied based on the known results, that a block normalized SAR raw signal is a Gaussian stationary process and the feature of wavelet transform can eliminate the signal correlation for its multiresolution decomposition. Through the experiment, the results achieved are satisfied.
    S-Fuzzy2PI:A New Active Queue Management Algorithm
    WANG Guang-hui;WAN Xiao-dong
    2009, 1(10):  14-4.  doi:
    Asbtract ( 1004 )  
    Related Articles | Metrics
    A new algorithm for AQM is proposed based on the Smith predictor and Fuzzy2PI control(SFuzzy2PI). SFuzzy2PI combines PI controller with fuzzy controller. When congestion level is high, this paper uses fuzzy controller to improve the quick convergence speed and strong robustness. And when congestion level is lower, this paper uses PI controller to improve the stability. As the network congestion control system is essentially a delay system, so it brings up Smith predictor to overcome the negative impact on stability by large delay. The network simulation (NS2) results show that the transient response and tracking capability of the SFuzzy2PI is better, which is more suitable for the changing and large delay network system.
    论文
    Parallel Study of Ant Colony Algorithm
    SU Sheng-qu;LIANG Sheng-zhuo
    2009, 1(10):  18-3.  doi:
    Asbtract ( 1470 )  
    Related Articles | Metrics
    Parallel computing as modern computer an important method of calculation, in a large part, optimizes the ant colony algorithm calculation processes. The ant colony algorithm itself implies a parallelism, in essence, the ant algorithm is characterized by the parallel collaborative optimization calculation methods and gets optimization solution by it. This article focuses on realization the ant colony algorithm parallel, through a simulation to verify that the ant colony optimization algorithm in parallel is the optimal solution method in solving problems with timevarying dynamic, continuous, multiinput and the optimal control of nonlinear system then arrive a conclusion that the ant algorithm has more advantages than anther in accelerator.
    数据库
    Research on Selfadaptive Database in Comprehensive Evaluation Universal Support System
    GAO Chang-yuan;PENG Ding-hong
    2009, 1(10):  21-5.  doi:
    Asbtract ( 985 )  
    Related Articles | Metrics
    According to many comprehensive evaluation support systems existed at present possess the limits which lacking of universality and flexibility, this paper analyzes the process of comprehensive evaluation from the view of data streams. Focusing on the discuss and study of the selfadaptive database in comprehensive evaluation universal support system, the dynamic construction of index systems, evaluation index dictionary closely related to the database are also designed and implemented. Finally, a concrete example is given to show theirs dynamic and universal characteristics.
    A Simple Linear Bayesian Classifier Knowledge Base Organizational Method
    WU Wei-sheng;WU You-xin;YOU Jian-ping;WAN Min
    2009, 1(10):  26-3.  doi:
    Asbtract ( 1015 )  
    Related Articles | Metrics
    This paper presents a simple linear knowledge base organization method based on Bayesian classifier. The method caculates probabilities of all the conditions in accordance with the naive Bayesian classification algorithms, and stores the final results in a linear table, for quickly finding to predict the probability of an unknown type Sample. The method is scalability.
    Research on Decision Tree Technology in Data Mining
    SHI Lei;TANG Yan-qin;ZHANG Xin-xing
    2009, 1(10):  29-4.  doi:10.3969/j.issn.1006-2475.2009.10.009
    Asbtract ( 1052 )  
    Related Articles | Metrics
    Decision tree technology is one of the important technologies in solving classification problems.This paper mainly researchs the decision tree technology in the data mining, summarizes the fundamentals and advantages of decision tree, describes the ID3 algorithm and comments its characteristics, discusses some optimization algorithms based on choosing splitting attributes, and proposes further research directions of decision tree theory.
    Study on Transforming Semantic Constraints of XML Schema into Relational Database
    LI Zhi-hui
    2009, 1(10):  33-5.  doi:10.3969/j.issn.1006-2475.2009.10.010
    Asbtract ( 1078 )  
    Related Articles | Metrics
    The semantic constraints of data can be well preserved to ensure the nonloss of the conversion from XML schema to relation schema. For this purpose, this paper analyses briefly the semantic constraints characteristics in both XML schema and relation schema, and gives the detailed introduction about the conversion methods from the semantic constraints of XML schema to the integrity constraints of relation schema.
    Research and Solution of Database Table Generated Dynamically Mapping in Hibernate
    YAO Zhen-yu
    2009, 1(10):  38-3.  doi:10.3969/j.issn.1006-2475.2009.10.011
    Asbtract ( 1042 )  
    Related Articles | Metrics

    A server log management system is been designed based on the Struts+Hibernate framework. The problem that how Hibernate maps tables are generated dynamically in database to objects is been solved bycombining SQL sentence to Hibernate. The system is easier to manage and to enlarge, and the efficiency is improved.

    模拟与仿真
    Uncertainty Evaluation for Virtual Instrument Measuring Voltage
    LI Tao;YUE Rui-hua;TENG Hong-lei
    2009, 1(10):  41-4.  doi:10.3696/j.issn.1006-2475.2009.10.012
    Asbtract ( 1027 )  
    Related Articles | Metrics
    This paper introduces the postulate of virtual instrument, proposes a new uncertainty evaluation method for virtual instrument measuring voltage, firstly evaluates uncertainty for hardware of virtual instrument, and the programme which giving the emulational signal accord with the capability of hardware, deals with the emulational signal accord to measure algorithm of virtual instrument〖KG-*3〗, and acquires the result of uncertainty evaluation by making statistical analysis. This method is the same with other measuring of virtual instrument.
    Simulation of AttackDefense Warfare Based on HLA/CGF
    LUO Yan-chun;WANG Feng-xian;LU Xue-yan
    2009, 1(10):  45-4.  doi:10.3969/j.issn.1006-2475.2009.10.013
    Asbtract ( 1019 )  
    Related Articles | Metrics
    In recent years, the development tendency and the emphasis of researching of warfare simulation system have been built system depended on High Level Architecture(HLA).So that, this paper presents a method for developing attackdefense warfare simulation system adopting CGF and HLA. First presents the structure of system and discusses the simulation model of it. Secondly researches on the designing and realizing method of warfare simulation adopting CGF. Lastly realizes 2D situation demonstration by performance, which offers technology support to research the attackdefense warfare simulation system.
    Introduction to Application and Methods of Computer Simulation
    WAN Shi-chang;ZHANG Zhen
    2009, 1(10):  49-3.  doi:10.3969/j.issn.1006-2475.2009.10.014
    Asbtract ( 1093 )  
    Related Articles | Metrics

    Computer simulation is an important computer application, it can simulate many targets in the real world, and provide more convenient ways for people to understand the real world. This paper analyzes the application of computer simulation in each domain, and compares the methods with each other, finally discusses the development of computer simulation technology.

    A MultiAgentBased Model of Air Route Traffic Control System
    HENG Hong-jun;GAO Yan;XI Kai-lei
    2009, 1(10):  52-4.  doi:10.3969/j.issn.1006-2475.2009.10.015
    Asbtract ( 1046 )  
    Related Articles | Metrics

    The modern information technology has being introduced to the air traffic control areas for a long time. Aims at helping the air traffic controller to make suitable decisions, this paper presents a multiagentbased model of air route traffic control system, which composed of three type of agents——the flight agent, the controller agent, and the interface agent.

    网络与通信
    Research and Implementation of New Transition Technologies Based on Tunneling and NAT-PT
    YANG Zheng-fu;FU Guang-xuan
    2009, 1(10):  56-3.  doi:10.3969/j.issn.1006-2475.2009.10.016
    Asbtract ( 1076 )  
    Related Articles | Metrics

    In hybrid network, combination of tunnel technology and NATPT of their respective advantages, a new structure of the transitional mode technology is put out. To some extent, it aims to solve the problems in the transition, which are lack of address and usage of existing network equipments.

    An Algorithm of Threecolor Marker Based on Mobile Threshold
    JIANG Qi-ming;YUE Guang-xue;PENG Xiao-ning
    2009, 1(10):  59-3.  doi:0.3969/j.issn.1006-2475.2009.10.017
    Asbtract ( 1075 )  
    Related Articles | Metrics

    For the issue of bandwidth fair distribution on differentiated services, designs a new algorithm of threecolor marker based on the mobile threshold, the threshold of the threecolor marker algorithm automatically is adjusted according to the occupied bandwidth proportion of flow, thereby ensures the fairness of the network bandwidth distribution. The experiments show that fairness of the new threecolor marker algorithm have been quite enhanced comparing with the threecolor marker algorithm based on the time sliding window, it has some practice value to enhance the fairness of the bandwidth distribution.

    UPnP Device Remote Control System Design and Implement Based on Home Gateway with OSGi Platform
    CHEN Li-xin
    2009, 1(10):  62-4.  doi:10.3969/j.issn.1006-2475.2009.10.018
    Asbtract ( 1843 )  
    Related Articles | Metrics

    Aiming at solving remote control problem in digital home network environment, and by means of combining OSGi platform and UPnP technologies, this paper proposes a convenient, lowcost UPnP device remote control system architecture which is based on OSGi platform home gateway, and describes the systems analysis, design and implementation process. The experiment proves that the system can effectively achieve remote monitoring services, with features flexible extension and convenient deployment. The architecture and development technology can be applied to other digital home applications systemes.

    Development of Distributed Monitoring System Based on VB
    YU li-na
    2009, 1(10):  66-4.  doi:10.3969/j.issn.1006-2475.2009.10.019
    Asbtract ( 1012 )  
    Related Articles | Metrics

    his article describes how to use variety of communication means of VB to realize many kinds of communication functions of distributed monitoring system, provides its principle and gives examples to every kind of communication means.

    Design and Implementation of NETCONFbased Configuration Management System
    WANG Cong;WANG Weiping;ZHENG Lei
    2009, 1(10):  70-5.  doi:10.3969/j.issn.1006-2475.2009.10.020
    Asbtract ( 1057 )  
    Related Articles | Metrics

    SNMP has some deficiencies in the area of configuration management. To complement the weaknesses of SNMP, NETCONFbased technology on configuration management is being put on the research agenda. Based on the layers of NETCONF protocol, this paper designs and implements NETCONFbased configuration management system. This article describes data model of NETCONF in YANG language. Addressing the functional requirement of the configuration management, a layerbased system architecture is given and the primary classes for different layers are been present. In the design, the extensibility of the management information and the configuration operations are well supported, the security of the configuration operation is also provided.

    Applying Web Services in Extended Active Network
    DONG Qing;NAN Zhen-qi
    2009, 1(10):  75-3.  doi:10.3969/j.issn.1006-2475.2009.10.021
    Asbtract ( 1018 )  
    Related Articles | Metrics

    An idea is put forward that Web services can be applied in an active network by extending the architecture of active network and setting up network management centers for active network. In this way Web services will have better distribution qualities and higher performances when applied. 

    Research on Data File Synchronous Mechanism in Heterogeneous Environment by Rsync
    ZHANG Hai-feng;ZHANG Yao-nan;ZHANG Bao-shan;
    2009, 1(10):  78-4.  doi:10.3969/j.issn.1006-2475.2009.10.022
    Asbtract ( 1050 )  
    Related Articles | Metrics

    Aim at the actuality of data platform of special environment and disaster, and the situation of the heterogeneous environment of the data management and dispersive to each data station, the data file synchronous to the platform of center is a problem that has to be solved. This paper puts forward adopting Rsync to solve this problem, which supported by the system of Unix, Linux, and Windows, and carries out the synchronous project in the heterogeneous environment in network.This paper sets up a schedule to solute the data synchronous in database system under the different operating system, reduces the using of network in synchronous process, raises the efficiency data synchronous, and builts up a new mechanism in synchronous.

    图像处理
    Trademark Image Retrieval Research Based on Combined Shape Features
    JIANG Wen-qing
    2009, 1(10):  82-4.  doi:10.3969/j.issn.1006-2475.2009.10.023
    Asbtract ( 1059 )  
    Related Articles | Metrics

    This paper proposes a method of trademark image retrieval based on multifeature extraction. Firstly, the proposed approach commences with the extraction of edges using the Canny edge detector. Secondly, extracts the Hu moment invariant, eccentricity and centroid distance. Thirdly, Euclidean distance is used to measure the similarity between the query and database images. At last the performance of the proposed algorithm is compared with other algorithms.

    Image Edge Detection Based on Rough Set Theory
    TONG Xing;WANG Ming-yan
    2009, 1(10):  86-2.  doi:10.3969/j.issn.1006-2475.2009.10.024
    Asbtract ( 1030 )  
    Related Articles | Metrics

    Rough set theory is a new soft calculation method which used to process fuzzy and indetermination problems. Edge is a kind of collection that involves big grayscale changes points. In nonnoise jamming’s situation, this is a characteristic that distinguishies the difference between edge and nonedge. But in the practical application, the image unavoidably mixes with some noise which impact accuracy of edge detection. This paper presents an image edge detection theory based on rough sets. According to the set’s similar relations of rough set, it first finds possible edge point set, using the characteristic of big grayscale changes. Then, uses the difference between noise and edge to find noise set. Finally, the difference between the two sets is on the verge of final demand points. Experimental results show,compared to traditional methods of edge detection, this method has certain improvement in examination accuracy.

    Application Research on Clustering Analysis in Unsupervised Image Classification
    MENG Hai-dong;HAO Yong-kuan;WANG Shu-ling
    2009, 1(10):  88-4.  doi:10.3969/j.issn.1006-2475.2009.10.025
    Asbtract ( 1021 )  
    Related Articles | Metrics

    In order to improve the application effectiveness of clustering analysis in unsupervised image classification, Clustering Algorithm based on Density and adaptive Densityreachable (CADD), which is designed and applied to image classification. Compared with the classifying results of Kmeans and hierarchical method, it is evident that CADD has good effects in unsupervised image classification.

    Algorithm of Image Edge Detection Based on Rough Set and Edge Information Meausure
    LIU Rui-ling
    2009, 1(10):  92-3.  doi:10.3969/j.issn.1006-2475.2009.10.026
    Asbtract ( 1027 )  
    Related Articles | Metrics

    Basing on rough set thinking, and combining with the edge information measure, a new edge detection algorithm is proposed. At first, the definitin of edge detection measure and its property is presened. Then pixels of image are classified by the properties of noises and edge detection measure. Setting the appriate threshold, the edge points and nonedge points are distinguished, and the true edge is found. The experimental results show that this algorithm can not only effectively reduce the noises of the image, but also can precisely detect the edge position, and keep the image edges’ details well, compute quickly.

    A Watermarking Algorithm Based on Fuzzy Clustering and Singular Value Decomposition
    LIN Li-xiong;SHU Zhi-biao
    2009, 1(10):  95-3.  doi:10.3969/j.issn.1006-2475.2009.10.027
    Asbtract ( 1051 )  
    Related Articles | Metrics

    A new watermarking algorithm based on fuzzy clustering and singular value decomposition is proposed. It makes good use of the HVS’s masking effect and searches the intricate texture field in the host image’s spatial field as the embedding position with FCM. Then the watermark is embedded based on SVD. Experimental results demonstrate that the proposed scheme effectively balances the conflict between the robustness and invisibility.

    Application of Association Rules in Image Data Mining
    HUANG Qiu-yong;TANG Ai-long
    2009, 1(10):  98-3.  doi:10.3969/j.issn.1006-2475.2009.10.028
    Asbtract ( 1033 )  
    Related Articles | Metrics

    This paper first analyzes traditional structure used in data mining of association rules of the basic idea. And then analyzes the characteristics of image data, and identifies the image data with the traditional distinction between structured data. Finally, improves the characteristics of image data combined with the traditional association rules. Applicating in image data mining, it can dig out the relevance of image data.

    应用与开发
    Research on Secondary Development Technology of UG Based on 〖JZ〗UG/Open MenuScript Using VC++
    JIANG Ling-ling;WANG Xi-yang
    2009, 1(10):  101-3.  doi:10.3969/j.issn.1006-2475.2009.10.029
    Asbtract ( 1182 )  
    Related Articles | Metrics

    First development tools of UG/Open are introduced, and concrete steps of menu making methods are given. On this basis, depending on the development of the overall impeller processing module, this paper elaborates on the use of UG/Open API function realizing customization of UG menu with the development platform of the VC+〖KG-*2〗+6.0. With examples of the development process of UG menu, the specific function of the code is proposed, and it provides good guide to develop UG. The technology can achieve the functions of UG system integration, and make the UG system to integrate seamlessly.

    Realization of Data Exchange in EGovernment Systems Based on Web Service
    LI Dong-rui;LI Wen-gui;XU Tong-de
    2009, 1(10):  104-4.  doi:10.3969/j.issn.1006-2475.2009.10.030
    Asbtract ( 1177 )  
    Related Articles | Metrics

    With the development of EGovernment, the government departments need to exchange their data urgently now. In the paper, an EGovernment data systems on Web Service is designed to solve the heterogeneity and distribution of government departments′ MIS. The system uses Web Service interface for various government departments seamless integration, in order to achieve transparent data exchange. The Web Service interface of EGovernment data exchange is realized through analyzing and designing a specific exmple.

    UML Modelling and C# Implementation of Secondhand Book Trade Website for Students
    MA Su-la;ZHANG Jian
    2009, 1(10):  108-4.  doi:10.3969/j.issn.1006-2475.2009.10.031
    Asbtract ( 1058 )  
    Related Articles | Metrics

    A secondhand book trade website is developed for students, it have founction of information publication, update fast, book reviews, informatiom easily be accessed, and prices fair. Following the UML modeldriven approach, a use case diagram of the system requirement, and class, sequence and communication diagrams of the system design are built. The system takes C# and ASP.NET as development language, uses SQL Server as database, and runs on the Microsoft .NET framework.

    Research on Integration of Information System for Universities
    GU Yun-feng
    2009, 1(10):  112-5.  doi:10.3969/j.issn.1006-2475.2009.10.032
    Asbtract ( 1720 )  
    Related Articles | Metrics

    The information system for universities is an integrated unit. But each of its subsystem is highly independent and thus its data and services cannot be shared due to the limit of software developing technologies and the slow development of information system for universities. Thereby, information system integration is an important research area to the construction of the information system for universities as well as a pressing problem faced by universities.
    Web service is a selfdescription and selfcontain application module, which is independent of developing platform and programming
    language. Based on the above advantages, service oriented architecture realizes a kind of standard, loose and coupling application architecture within systems. This paper points out the problems according to the traditional integration solution for universities, and puts forward the application integration solution based on the SOA and the Web services.

    Porting of Embedded GUI to ARM Based on Qt/Embedded
    HUA Jing;JIA Jing;HE Huo-jiao
    2009, 1(10):  117-3.  doi:10.3969/j.issn.1006-2475.2009.10.033
    Asbtract ( 1098 )  
    Related Articles | Metrics

    This paper, after analyzing the requirements of Embedded GUI(Graphical User Interface) in market, introduces the GUI based on Qt/Embedded. Then it explains the technique of porting Qt/Embedded to ARM in detail. This technique also has certain reference value to other Embedded boards. 

    Development of .NET Database System Based on 3tier Application
    LI Hong-qin
    2009, 1(10):  120-6.  doi:10.3969/j.issn.1006-2475.2009.10.034
    Asbtract ( 1003 )  
    Related Articles | Metrics
    The progress of computer technology drives the progress of software systerm design. Practice proves layered design is the primary method to improve the usability and maintainability of software system. This paper introduces the concept of 3tier application and applies it to the development of .NET database operation system. Through the functional partitionings of presentation, business and data access, this paper realizes the best way of Microsoft .NET application to access data. At last the paper uses an example to describe the development course of .NET database operation system based on 3tier application in detail, and then probes how to realize an effective method to transmit data between tiers of distibuted application.
    Multisensor Fusion Processing System for Unmanned Aerial Vehicle Track Data
    LI Shi-qiu;ZHENG Cheng-jun;WANG Cheng-jun
    2009, 1(10):  126-4.  doi:10.3969/j.issn.1006-2475.2009.10.035
    Asbtract ( 1006 )  
    Related Articles | Metrics

    A multisensor fusion processing system for Unmanned Aerial Vehicle (UAV) track data is designed based on the existed measuring instruments of various standards of the UAV measurement and control system. The system composition and the fusion processing technology are introduced and a simulating example is given. The results of simulation show that the processed track data is highly optimized and the precision and reliability are greatly improved.

    Automatic Marking System
    LANG Chang-sheng;LI Guang-zhen
    2009, 1(10):  130-3.  doi:10.3969/j.issn.1006-2475.2009.10.036
    Asbtract ( 1787 )  
    Related Articles | Metrics

    With the development of computer technology, people attach more importance to the test of computer operation skills. Instead of manual inspecting examination papers, the intelligent automatically system can improve the efficiency of inspecting examination papers, and it is becoming a hot research topic. It can complet the process of marking, by reading indirectly and judging the paper contents through the VB software. Meanwhile, the expert diagnostic advices are given based on the results of the examination.

    Modeling of Vehicle Insurance Management System Based on UML
    HUANG Xing-rong;LI Chang-ling;WU Qing
    2009, 1(10):  133-5.  doi:10.3969/j.issn.1006-2475.2009.10.037
    Asbtract ( 1218 )  
    Related Articles | Metrics

    After introducing the modeling process of UML, taking vehicle insurance management system as an example, the application of UML modeling, which occurs in the inception phase, elaboration phase, construction phase and test phase of system development, are elaborated. The application, the analysis and the design flow between adjacent phases during the accomplishment of main tasks in each phase are discussed and solved particularly. The applications sequence of class diagram and sequence diagram in the system design are discussed farther. The comparing with the traditional processoriented method in the analysis and design of system using UML are also presented. Generally, personnels are able to communicate their ideas clearly by virtue of UML. Also UML improves the efficiency of system modeling.

    Design and Realization of Transmission and Monitoring System ofNingxia Meteorological Information
    MA Ning;FAN Yan-fang;ZHUO Feng-yan;WANG Fan;JIANG Bo;YU Jie-jun;CUI Wei;ZHOU Hong
    2009, 1(10):  138-3.  doi:10.3969/j.issn.1006-2475.2009.10.038
    Asbtract ( 1074 )  
    Related Articles | Metrics

    In view of the current meteorological information services existing such problems, like too many monitoring platforms, too heavy duties of information supervisors, Ningxia meteorological information transmission monitoring system is researched and developed. This paper introduces the design, the structure and framework, and the data flow, then explores some key solutions in the process of realization.

    Realization of Program Window Monitor by Hook Technology in VB Program
    PAN Jing-xin
    2009, 1(10):  141-3.  doi:10.3969/j.issn.1006-2475.2009.10.039
    Asbtract ( 1132 )  
    Related Articles | Metrics

    By using hook technology, the event messages of Windows system can be monitored and the system can be controled. This paper introduces how to use API function in VB programing to set up hook, and realizes program window monitor by designing the hook function.

    Design of Weighting System Based on DSP and Fiber Bragg Grating Sensor
    CHEN Yi-jin;WAGN Xing-guo;WANG Qi;LIAO Jian-qing
    2009, 1(10):  144-3.  doi:10.3969/j.issn.1006-2475.2009.10.040
    Asbtract ( 1040 )  
    Related Articles | Metrics

    A method of weighing system with fiber bragg grating sensor and DSP is presented. The structure and principle of fiber bragg grating sensor are analyzed. Hardware design of the system based on DSP and signal conditioning circuit are described. The main program flow charts of system are introduced in software design. Experiments show that the system design meet the basic requirements.

    Modeling of Students’ Comprehensive Assessment System Based on UML
    ZHOU Wei;GAO Chuan
    2009, 1(10):  147-3.  doi:10.3969/j.issn.1006-2475.2009.10.041
    Asbtract ( 1091 )  
    Related Articles | Metrics

    Students’ comprehensive assessment system is the important part of university student management information system, which is suitable for the need of promoting students’ overall development, training innovative talents, feasibly improving the efficiency and quality of students’ comprehensive quality evaluation work in univiserty. In this paper, software engineering principle and object oriented technology is combined to analysis and design of students’ comprehensive assessment system, it builds system model by using UML which contains several type of models like use case model, static model and dynamic model, respectively described with UML diagram such as

    use case diagram, class diagram and sequence diagram.

    Design and Implementation of University Dormitory Management System Based on .NET
    ZHOU Lei;CHANG Jin-yi
    2009, 1(10):  150-4.  doi:10.3969/j.issn.1006-2475.2009.10.042
    Asbtract ( 1224 )  
    Related Articles | Metrics
    The university dormitory management system based on the B/S framework, is built with.NET technology. The system implements the management of data, and improves efficiency and clarity of the dormitory management. This article mostly introduces the frame design of the system and its mutual technology of database.
    Design and Implementation of Short Message Subsystem in Online Administrative Office System Based on Lotus Domino
    ZHOU Jian-zhong
    2009, 1(10):  154-4.  doi:10.3969/j.issn.1006-2475.2009.10.043
    Asbtract ( 1017 )  
    Related Articles | Metrics

    Early online administrative office system, developed by module stacking mode based on Lotus Domino R6 platform, transmission of message was limited to the LAN. The subsystem of short message eliminates the delay of information by the manmachine separation and breaks though the area restriction which can only use in the office in traditional online administrative office system. Accordingly, it transmits the information to users more immediately, broadens the working area of administrative institution and improves the working efficiency. 

    人体识别
    Design of Pickup & Dropoff System of Kindergarden Based on Fingerprint Recognition
    SONG Zhi-qiang;XU Jian
    2009, 1(10):  161-4.  doi:10.3969/j.issn.1006-2475.2009.10.045
    Asbtract ( 1721 )  
    Related Articles | Metrics
    This paper introduces how to design the pickup & dropoff system of kindergarten based on fingerprint recognition, using U.are.U 4000 fingerprint sensor, FingerCell 1.2 fingerprint recognition algorithm and short message system. The design scheme, system structure and software design method of the pickup & drop off system based on fingerprint recognition and data management center are described. The method of static fingerprint recognition library call is analyzed in detail. Combining the mature fingerprint recognition technology with short message platform, this system resolves the potential dangers when people pick up or drop off the children in kindergarten. It has high veracity, quick recognition speed and improves the kindergarten’s security.
    Research on Gaitbased Body Identification Method
    WANG Tong-jie;WU Ya-wen
    2009, 1(10):  165-4.  doi:10.3969/j.issn.1006-2475.2009.10.046
    Asbtract ( 1015 )  
    Related Articles | Metrics
    Human gait recognition is the process of identifying individuals by the walking manner. In the last years, the gait as one of biometrics has attracted more and more interest. The origin of human gait recognition is described. The forefront technology of gait recognition in the world is studied. The main method of gaitbased human identification is analyzed. It has an important guiding significance for the research in the future.
    语音识别
    Construction and Analysis of Speech Recognition System of Continual HMM
    ZHANG Jun;WEI Ren-yong
    2009, 1(10):  169-3.  doi:10.3969/j.issn.1006-2475.2009.10.047
    Asbtract ( 1000 )  
    Related Articles | Metrics
    Some basic concepts of speech recognition are introduced. And the course of dual threshold endpoint detection is detailedly introduced by flow chart. Continual HMM was used as model of system. The three basic problems met in the course of realizing system are analyzed and the corresponding solutions are provided. The accuracy can reach to 95% by using system which recognized different voice commands of different people. 
    A Wireless Low Consumption Method of Voice Data Acquisition
    XU Hai-yan
    2009, 1(10):  172-3.  doi:10.3969/j.issn.1006-2475.2009.10.048
    Asbtract ( 1012 )  
    Related Articles | Metrics
    Principles of the transfer interface and the transmitreceive process of voice data are depicted. Using CC2430 as the core processor, the data acquisition system is extended by adding the TLV320AIC1107 PCM codec to perform the transmitreceive encoding conversion with baud rate at 64kbps. Tests show some features of the design, such as less additional peripheral devices, short latency, and low consumption.
    Application of Pronunciation Retrieval in Chinese Medicine Prescription Information System
    KONG Xiang-yong;SONG Jian
    2009, 1(10):  175-4.  doi:10.3969/j.issn.1006-2475.2009.10.049
    Asbtract ( 1006 )  
    Related Articles | Metrics
    In view of the prescription system byhand input prescription efficiency low question, this paper develops one section Chinese medicine prescription information system based on the speech recognition technology, this system uses the Microsoft pronunciation to develop platform Microsoft Speech SDK(SAPI 5.1) to realize. Through the phonetic feature storehouse, this system retrieves the dilantin and dosage by doctors, inquires drugs database. The speech recognition rate of accuracy is extremely high, reduces doctor’s work load.
    信息安全
    A Secure Protocol for Determining Whether Two Spacial Spheres Intersect
    LIU Yong-bin
    2009, 1(10):  179-3.  doi:10.3969/j.issn.1006-2475.2009.10.050
    Asbtract ( 1013 )  
    Related Articles | Metrics
    Secure multiparty computation is one of research focuses in information security field. Privacypreserving computational geometry is a special case of secure multiparty computation problems. Based on two basic protocols of secure multiparty computation, a secure protocol is designed for determining whether two spacial spheres intersect, and its correctness and security are analyzed.
    Analysis and Improvement for k-anonymity Model in Medical Information Data Publishing
    WU Bu-qi;BAI Xiao-ming;ZHANG Le
    2009, 1(10):  182-3.  doi:10.3969/j.issn.1006-2475.2009.10.051
    Asbtract ( 1067 )  
    Related Articles | Metrics

    K-anonimity model is an important model to protect data privacy in data publishing. This paper analyzes the model, and finds some shortcomings of it in medical information data publishing. This paper presents a split method to conquer this problem.

    Research on Dynamic Password Identity Authentication Based on Time Synchronization
    SU Wu;WANG Ming-yan;TONG-Xing;SHAO Feng-rui
    2009, 1(10):  185-3.  doi:10.3969/j.issn.1006-2475.2009.10.052
    Asbtract ( 985 )  
    Related Articles | Metrics

    This paper introduces some current dynamic password techniques, and emphasizes the identity authentication based on the time synchronization mechanism in these techniques. Then it introduces this method’s principle, work progress, and analyses its security and shortage. At last, it gives some solution schemes on its lack of defending second hand’s attack and time excursion to make it safer and perfect.

    Research and Implementation of Removable Storage Devices Security Management Technology
    PENG Dong;LING Jie
    2009, 1(10):  188-3.  doi:10.3969/j.issn.1006-2475.2009.10.053
    Asbtract ( 983 )  
    Related Articles | Metrics
    With the development of computer technology, removable storage devices are widely used by people. But it will lead to high risk to corperations’ sensitive data. This paper describes a new management method of removable storage devices. The method extracts a unique ID of each device, then uses the ID to generate a certificate. When removable storage devices plug into network which is based on the management method, these devices need to be authenticated their certificates. If devices passing the authentication they can be used according to their authorities. Finally, this paper gives an implementation of the management method.